article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

Related: Ground zero for cybersecurity research Having covered the cybersecurity industry for the past 15 years, it’s clear to me that there are two primary reasons. ThreatQuotient was in this vanguard and helped introduce the use of threat libraries — receptacles for intel coming in from different teams.

Big data 153
article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

By patiently slipping past the best cybersecurity systems money can buy and evading detection for 16 months, the perpetrators of the SolarWinds hack reminded us just how much heavy lifting still needs to get done to make digital commerce as secure as it needs to be. Related: DHS launches 60-day cybersecurity sprints.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

So while I'm not going to log in as root or admin on the bottom for a lot of those kinds of scenarios, I absolutely help our clients understand based upon industry knowledge based upon what we see, etc. VAMOSI: Cybersecurity insurance. I would have had to spend a million of that just on cybersecurity.